New Public-Key Cryptosystem Based on Two-Dimension DLP

被引:2
|
作者
Zhang, Xiaoqiang [1 ]
Zhu, Guiliang [2 ]
Wang, Weiping [2 ]
Wang, Mengmeng [2 ]
Ma, Shilong [1 ]
机构
[1] Beihang Univ, State Key Lab Software Dev Environm, Beijing, Peoples R China
[2] North China Univ Water Conservancy & Elect Power, Zhengzhou, Henan, Peoples R China
关键词
asymmetric cryptosystem; discrete logarithm problem (DLP); two dimensions; RSA; ECC (elliptic curve cryptosystem);
D O I
10.4304/jcp.7.1.169-178
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The asymmetric cryptosystem plays an important role in the cryptology nowadays. It is widely used in the fields of data encryption, digital watermarking, digital signature, secure network protocol, etc. However, with the improvement of computing capability, longer and longer the key length is required to ensure the security of interaction information. To shorten the key length and improve the encryption efficiency, by defining the two-dimension discrete logarithm problem (DLP), a new public-key cryptosystem is proposed. This new cryptosystem generalizes the public-key cryptosystem from one dimension to two dimensions. The core algorithms of the proposed cryptosystem are also designed, including the fast algorithm, computing the inverse matrix modulo p and finding the period. To verify the correctness and rationality of the new cryptosystem, two examples are carried out. Meanwhile, the efficiency and security are analyzed in detail. Experimental results and theoretical analyses show that the new cryptosystem possesses the advantages of the outstanding robustness, short key length, high security and encrypting many data once.
引用
收藏
页码:169 / 178
页数:10
相关论文
共 50 条
  • [31] New public-key cryptosystem using braid groups
    Ko, KH
    Lee, SJ
    Cheon, JH
    Han, JW
    Kang, JS
    Park, C
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 166 - 183
  • [32] New VLSI architectures of RSA public-key cryptosystem
    Wang, PA
    Tsai, WC
    Shung, GB
    ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 2040 - 2043
  • [33] Public-key cryptosystem based on elliptic curve isogenies
    Hu, Jin
    He, De-Biao
    Chen, Jian-Hua
    Huang, Yin
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2011, 37 (06): : 916 - 920
  • [34] Multiplier for public-key cryptosystem based on cellular automata
    Kim, HS
    Hwang, SH
    COMPUTER NETWORK SECURITY, 2003, 2776 : 436 - 439
  • [35] Public-key cryptosystem based on invariants of diagonalizable groups
    Marko F.
    Zubkov A.N.
    Juráš M.
    Marko, František (fxm13@psu.edu), 1600, Walter de Gruyter GmbH (09): : 31 - 54
  • [36] Cellular automata based multiplier for public-key cryptosystem
    Kim, HS
    Yoo, KY
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 227 - 236
  • [37] ON A PUBLIC-KEY CRYPTOSYSTEM BASED ON ITERATED MORPHISMS AND SUBSTITUTIONS
    SALOMAA, A
    YU, S
    THEORETICAL COMPUTER SCIENCE, 1986, 48 (2-3) : 283 - 296
  • [38] A public-key threshold cryptosystem based on residue rings
    Deacon, Stephanie
    Duenez, Eduardo
    Iovino, Jose
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (04): : 559 - 571
  • [39] A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA
    Romankov, V. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 29 (03): : 32 - 40
  • [40] Public-key Cryptosystem Based on Permutation Rational Function
    Wei, Pengcheng
    Wei, Ran
    Zhu, Yingxian
    Yang, Xinbo
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 452 - 454